the messages to be hidden without destroying the property of the cover image signicantly. Supervisor(s Jena, S K, repository Staff Only: item control page). Steganography is derived from the Greek word steganographic which means covered writing. Divisions: Engineering and Technology Department of Computer Science. For hiding secret information in images, there exist a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. It is the science of embedding information into cover objects such as images that will escape detection and retrieved with minimum distortion at the destination. Item Type: Thesis (BTech uncontrolled Keywords: Steganography, LSB, Pseudo-Random, Image, secret message, stego-key, cover image. Devi, Kshetrimayum Jenita (2013 a Secure Image Steganography Using LSB Technique and Random Pseudo Random Encoding Technique. The LSB-based technique is the most challenging one as it is dicult to dierentiate between the cover-object and stego- object if few LSB bits of the cover object are replaced.
Image steganography thesis pdf - Admanline
Both the techniques used a stego-key while embedding messages inside the cover using the key, the chance of getting attacked by the third party is reduced. Engineering and Technology Computer and Information Science quality essay in kannada about nature Information Security. ID Code: 4626, deposited By: Hemanta Biswal, deposited On: 16:18, last Modified: 14:12. The goal of steganography is to hide the existence of the message from a third party. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected. In Pseudo-Random technique, a random-key is used as seed for the Pseudo-Random Number Generator is needed in the embedding process. Many dierent carrier le formats can be used, but digital images are the most popular because of their frequency on the Internet.